UGRD > IT
Information Technology Courses
IT 110 Information Technology Problem Solving +
Description:
Several IT concepts are introduced including programming, databases, networking, web servers and how they work together in a modern system. Students work in groups to implement examples of these systems. The course examines the importance of key issues such as security, privacy, and ethics. Students should leave the course with an understanding of the components of modern systems and the scope of knowledge needed to become an IT professional. More Info
Offered in:IT 111L Managerial Statistics +
Description:
Provides the student with the basic statistical techniques needed for business decision making in areas such as operations management, quality improvement, marketing research, finance, and general management. The course examines collection and presentation of data, frequency distributions, basic probability, statistical inference, and regression. Students use statistical software for data presentation and analysis. More Info
Offered in:IT 114L Introduction To Java +
Description:
An introductory course in Java programming that exposes students to the concepts involved in using a higher-level, object-oriented programming language. The course will explain the program development process and give students lots of hands-on experience writing small Java programs. More Info
Offered in:IT 116 Introduction to Scripting +
Description:
Information Technology specialists do no spend most of their time programming, but they must perform many routine tasks to keep the systems maintained in good working order.Automating these routine tasks, allows this work to be performed quickly and consistently, freeing the specialist for work that requires time and judgement. This automation is accomplished by writing small programs which are specific to the task at hand. These programs are best written in programming languages which are simple and flexible. This makes languages designed for large projects, such as Java and C++, unsuitable for this task.To meet this need, scripting languages such as Perl, Python, and PHP have been created. These languages are designed to be easier to learn than more demanding programming languages such as Java, C and C++.This course will teach the basics of scripting language and show students how it can be used to automate routine system administration and workflow tasks. More Info
Offered in:IT 117 Intermediate Scripting +
Description:
This course, a continuation of IT 116 Introduction to Scripting, covers advanced features of scripting languages such as objects and regular expressions.Programming assignments will emphasize tasks that a system administrator might perform.Students will learn to use an industry standard framework to assist in the creation of a web application. More Info
Offered in:IT 187SL Science Gateway Seminar I +
Description:
This is a two-semester course on technology, in particular information technology (IT) and how it relates to our lives. Students will read both fiction and non-fiction where technology is an issue, and discuss it in written work and orally, both individually and in small groups. The overall goal is to learn about and discuss various facets of information technology and its social implications. More Info
Offered in:- TBA
IT 188SL Science Gateway Seminar II +
Description:
This is a two-semester course on technology, in particular information technology (IT) and how it relates to our lives. Students will read both fiction and non-fiction where technology is an issue, and discuss it in written work and orally, both individually and in small groups. The overall goal is to learn about and discuss various facets of information technology and its social implications. More Info
Offered in:- TBA
IT 220 Computer Forensics I +
Description:
This course covers topics related to computer forensics and criminal justice and is, by its nature, a multi-disciplinary course. Forensics is the use of science in a course of law. Computer Forensics and this course looks specifically at how one obtains evidence off of a computer, other digital devices and from network messages and logs, preserving the evidentiary chain, and the legal aspects of the search and seizure of computers and related equipment/information. More Info
Offered in:IT 221 Computer Forensics II +
Description:
This course is designed to expose students to advanced concepts in digital/computer forensic analysis. As with Computer Forensics I, there will be a balance between legal and technical aspects, although this course will focus more on the use of specific tools. For example the students will practice Disk and other digital device analysis using professional proprietary widely-used software tools such as Encase. More Info
Offered in:IT 230L Relational Databases +
Description:
This course provides a thorough review of basic relational database concepts and how to apply these concepts to a variety of application problems. The course focuses on the use and properties of relational database management systems. Topics covered include DBMS architecture levels, data modeling, data definition and manipulation capabilities of Structured Query Language programming, and programming techniques for accessing relational databases. More Info
Offered in:IT 240 Web Fluency +
Description:
This course develop an in-depth understanding of how the web works from a technical standpoint, meaning how dynamic pages are created and delivered by web servers, and then used by browsers and other clients. Students demonstrate this understanding by achieving competency by using a current integrated development environment (IDE) to develop web applications. More Info
Offered in:IT 244 Introduction to Linux/Unix +
Description:
A course designed to introduce students to Linux and UNIX. Students will install, set up, and operate standard tools and learn how they operate together. By course end students will have installed a fully functional Internet server while understanding its structure. Security issues of operating systems will be studied throughout the course. More Info
Offered in:IT 246 Introduction to Networks +
Description:
We will study basic data communication and networking concepts for LAN and WAN; network protocols with emphasis on Ethernet, PPP, TCP/IP, and WWW protocols, and mobile and wireless networks. Network applications include Telnet, ftp, email, distributed file systems, and client-server applications. We survey network security issues. We will do hands-on network simulation and network sniffing exercises to see how these technologies work in practice. More Info
Offered in:IT 285L Social Issues and Ethics in Computing +
Description:
This course explores some of the ethical and societal issues that are raised by computing. Topics include privacy, freedom of expression, intellectual property, liability, the effect of computing on social interaction, and human-computer interface issues. Students write an analytical paper on an appropriate topic and also present their findings to the class. More Info
Offered in:IT 341 Introduction to System Administration +
Description:
This is an introduction to the process of choosing, installing, configuring, and maintaining UNIX operating systems such as Linux. Topics include user management, file system management, security, networked file systems (NFS), networked information systems (NIS), domain name servers (DNS), mail systems and printers. Students will get practice writing shell scripts. Also, students are introduced to general systems administration policy. More Info
Offered in:IT 360 Enterprise Software +
Description:
This course explains the core applications of a typical organization to support their fundamental business functions. It explains the role of IT in attaining competitive advantage and how modern organizations configure commercially available products to satisfy their information needs. The course makes extensive use of collaborative technologies and business applications to demonstrate the work of virtual teams and how they implement their operations. More Info
Offered in:IT 370 Introduction to Analytics +
Description:
This course introduces concepts in analytics and explores how analytics can help improve management effectiveness through better decision-making in several functional areas such as marketing, finance, and manufacturing. This course will explore applications of analytics, such as online analytical processing (OLAP), dashboards, management reporting, performance measurement, and data visualization, and how these are developed and applied. It will also investigate analytics in context of decision-making and closely related areas such as data warehousing, data marts, web analytics, real-time data, and mobile applications. Students will gain hands-on experience through assignments and projects using a comprehensive set of current tools. More Info
Offered in:IT 420 Network and Mobile Forensics +
Description:
This course deals with the collection, preservation, and analysis of network generated digital evidence such that this evidence can be successfully presented ina court of law (both civil and criminal). The course provides a comprehnsive understanding of network forensic analysis principles as well as an introduction to mobile (i.e. Cell-phone/PDA) forensics. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students will understand, learn, and experience the relationship between forensic analysis and network security technologies. More Info
Offered in:IT 421 Digital Forensics/Malware Analysis +
Description:
This course provides an introduction to advanced digital forensics topics relating to malicious software (malware) and its analysis. Malware (virus, worms, rootkits, spam...) represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks on multiple platforms (e.g.Windows, Linux..). Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures in the context of malware. In addition, students will study remediation measures for malware infection. More Info
Offered in:- TBA
IT 425L Project Management +
Description:
Covers techniques and managerial concepts of project management. This course prepares students to manage either complex physical projects or complex software development projects. Topics presented in this course include project life cycles, economic analysis of projects, work breakdown structure, cost estimation, and the scheduling, staffing, directing, and controlling of projects. The course also covers the use of management science techniques and computer software for project management. More Info
Offered in:IT 428L Information System Security +
Description:
This course provides a broad overview of the threats to the security of information systems, the responsibilities and basic tools to ensure information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. Students will learn and understand the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. More Info
Offered in:IT 442 Windows System Administration +
Description:
This is an introduction to the process of choosing, installing, configuring, and maintaining Microsoft Windows client and server systems. Topics include user management, file systems, network domains and domain management, mailers, and printing. Students get practice in writing scripts for performing maintenance tasks. Also, students learn how these tasks fit into the more general system administration processes. More Info
Offered in:IT 443 Network Security Administration I +
Description:
This course explores the application of policy and techniques to securing both public and private networks. The course is project-based and includes such topics as threat analysis and management, cryptography, firewalls, isolation, issues in securing wireless networks, and certificates. More Info
Offered in:IT 444 Network Security Administration II +
Description:
This course will focus on network protection (firewall implementation, site-to-site vpn configuration, and identity management), information gathering (port scan, service scan), and penetration testing (internal test and external test). The internal pen-test can cover vulnerability assessment including server vulnerabilities discovery, server attack, client side attack and social engineering attack. More Info
Offered in:IT 456 Information Storage and Management +
Description:
This course provides a thorough review of basic relational database concepts and how to apply these concepts to a variety of application problems. The course focuses on the use and properties of relational database management systems. Topics covered include DBSM architecture levels, data modeling, data definition and manipulation capabilities of Structured Query Language programming, and programming techniques for accessing relational databases. More Info
Offered in:IT 460 Integration Methodologies and Tools +
Description:
This course develops an understanding of applications architecture based on building IT systems out of common parts and a service-oriented architecture. These are collections of information services, modules and functional components that can be reused in a variety of common contexts. The course will apply several tools to exemplify the use of heterogeneous reusable modules to fulfill an information service. An underlying methodology for integration will be applied. More Info
Offered in:IT 461L Systems Analysis and Design +
Description:
Introduces recent approaches to the analysis and design of computer information systems, including the hands-on use of computer aided software engineering (CASE) tools. The changing role of the systems analyst in both operations and systems applications in today's organizations is examined. The course critically analyzes systems development methodologies, including life cycle models and prototyping; reviews user-led developments and current approaches which facilitate user-developer collaboration; discusses effective diagramming and notational techniques now available to define and document functional requirements and operational business processes; and examines current methods used to test and evaluate the accuracy, completeness, and usability of documented requirements and convert them into efficient systems design or re-engineering processes. Topics include CASE tools, module and transaction design, human-computer interfaces, and system configuration. This course includes practical experience in analyzing and designing an organizational application. It discusses the concept of quality as applied to information systems and business process redesign as well as the role of information systems in managing quality within an organization. More Info
Offered in:IT 471 Data Warehousing for Business Intelligence +
Description:
this course provides students with the technical skills required to plan and implement a data warehouse using a database management system. It describes basic data warehousing concepts. The course covers design and implementation of data marts and operational data stores. Topics include dimensional data modeling for warehouses, CUBES and storage modes including MOLAP, ROLAP and HOLAP, and data warehousing infrastructure and analytical service tool selection. This course involves designing a data warehousing system and the implementation of a database with a stare schema, gathering data from primary data sources, transforming data, and loading it into a database management system. Students create cubes using OLAP and analyze cube data using client application. More Info
Offered in:IT 472 Data Mining for Management Applications +
Description:
Data Mining provides a set of techniques that explore large quantities of data to discover meaningful patterns and make predictions. It helps businesses analyze data from different perspectives, gain insights into the vast amount of data extracted from internal and external sources, and to measure performance, reduce costs, and seek competitive advantage. As a result, data mining has become vital to most enterprises today. This course introduces data mining through an investigation of its underlying concepts, and explores practical methods for its application. Students will learn the appropriate use of several data mining methods based on unsupervised algorithms such as cluster analysis and association rules, and those based on supervised algorithms such as decision trees and neural networks. Students will gain experience with applications of data mining using current data mining software. More Info
Offered in:- TBA
IT 478 Independent Study +
Description:
Work done by a student or group of students under faculty supervision on material not currently offered in a regularly scheduled course. Students wishing to undertake such work must first find a faculty member willing to supervise it; the work to be completed must be approved by the department chairperson. More Info
Offered in:IT 480 Special Topics +
Description:
A course covering material not currently covered by other courses. This course can serve as a trial run of material which will later be covered in a new course added to the catalog. More Info
Offered in:- TBA
IT 485 Information Technology Capstone +
Description:
Students will work on a semester-long project, particular to their track and meet together with an instructor and with students from other tracks to discuss each other's projects. Students will deliver a product that is appropriate to their track in the IT program. At the end of the semester, students report on their product, both in oral presentations and demonstrations and in writing. More Info
Offered in: